Re: key question

2010-03-18 Thread Paul Richard Ramer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, 13 Mar 2010 20:05:21 + MFPA wrote: >> I can't speak for other people, but I can for me. Take >> > a look at the UIDs on my key, which is >> > 0xC7C66ADF3DB6D884. And also, take a look at my master >> > key 0x2188A92DF05045C2 that I sign

Re: Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
Yea, I don't need to have it entered automatically at boot time (if that's possible, I've just thrown all semblance of true security out the window). All I was looking for is a way to have gpg cache the passphrase for an indefinite amount of time; and a human can enter the passphrase at boot. It s

FLISOL 2010 Costa Rica

2010-03-18 Thread Esteban Monge
Hello: I am Esteban Monge, I live in Costa Rica and help the Red Costarricense de Software Libre (RCSL). Sorry for my english... but I need help. The day of FLISOL (April 24, 2010) we want make a little web conference about GPG, the idea is make a little demo to firm mails o encrypt a transmissi

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 2:43 PM, Grant Olson wrote: > On 3/18/2010 11:59 AM, Daniel Eggleston wrote: > > Not sure exactly what sort of database you're using, but gpg (to my > knowledge) doesn't do block-level/random access. You can't just mount > the database, stop using pgp, and write a block here and a bl

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 11:59 AM, Daniel Eggleston wrote: > Full-disk encryption still requires that the DBA enter a > passphrase at the time of mounting the disks and doesn't solve anything > (and is less cross-platform, there may be many different flavors of Unix > including HP-UX, AIX, and Linux); and encr

Re: Secure unattended decryption

2010-03-18 Thread Florian Philipp
Am 18.03.2010 12:50, schrieb Daniel Eggleston: [...] > > The encryption key for the databases is stored on-disk, encrypted with > PGP (Gnupg specifically). At first startup, it's no big deal to have the > DBA enter a passphrase to start the database server. Once a failover > occurs, though, time i

Re: Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
On Thu, Mar 18, 2010 at 10:37 AM, Grant Olson wrote: > On 3/18/2010 7:50 AM, Daniel Eggleston wrote: > > ..., with the ultimate goal > > that if somebody does somehow walk out with the storage containing the > > databases, there will be no way to gain access to the data. > > Physically walk out?

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 7:50 AM, Daniel Eggleston wrote: > ..., with the ultimate goal > that if somebody does somehow walk out with the storage containing the > databases, there will be no way to gain access to the data. Physically walk out? You could use some full disk encryption instead. And a lock on th

Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
I know it's sort of a contradiction in terms, but hear me out: The case I'm looking at is a High Availability environment hosting a database. The database is comprised of many Unix files, encrypted via AES, on shared storage. If the node accessing the database loses enough of its redundant hardwar